OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach
Emmanuel Tuyishime, Titus Bălan, Petru Adrian Cotfas, et al.
Applied Sciences (2023) Vol. 13, Iss. 22, pp. 12359-12359
Open Access | Times Cited: 9

Showing 9 citing articles:

Cyber Resilience Framework: Strengthening Defenses and Enhancing Continuity in Business Security
Ahmad AL-Hawamleh
International Journal of Computing and Digital Systems (2024) Vol. 15, Iss. 1, pp. 1315-1331
Open Access | Times Cited: 20

Real-Time Data Governance and Compliance in Cloud-Native Robotics Systems
Onyinye Obioha-Val, Oluwatosin Selesi-Aina, Titilayo Modupe Kolade, et al.
SSRN Electronic Journal (2025)
Closed Access

Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
Sina Ahmadi
Journal of Information Security (2024) Vol. 15, Iss. 02, pp. 148-167
Open Access | Times Cited: 2

Survey on Cloud Computing Security
Fatima Ismail AL-Hadi, Nagi Ali Al-Shaibany, Sharaf Abdulhak AL-Homdyl
مجلة جامعة صنعاء للعلوم التطبيقية والتكنولوجيا (2024) Vol. 2, Iss. 4, pp. 381-390
Open Access | Times Cited: 2

A Review of Artificial Intelligence Techniques for Improved Cloud and IoT Security
Kassim Kalinaki, Wasswa Shafik, Magezi Masha, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 38-68
Closed Access | Times Cited: 1

Enhancing the Efficiency of a Cybersecurity Operations Center Using Biomimetic Algorithms Empowered by Deep Q-Learning
Rodrigo Olivares, Omar Salinas, Camilo Ravelo, et al.
Biomimetics (2024) Vol. 9, Iss. 6, pp. 307-307
Open Access | Times Cited: 1

Securing the Skies- A Critical Analysis of Cloud Infrastructure Vulnerabilities
Vaishnavi Chaudhari, Poonam Dhake, Snehal Salunkhe
International Journal of Innovative Research in Computer Science & Technology (2024) Vol. 12, Iss. 3, pp. 87-95
Open Access

Emerging Cyber Risks & Threats in Healthcare Systems: A Case Study in Resilient Cybersecurity Solutions
Abdiaziz Abdi, Hajar Bennouri, Anthony Keane
2022 11th Mediterranean Conference on Embedded Computing (MECO) (2024), pp. 1-8
Closed Access

Page 1

Scroll to top